Upload
tanner-gresham
View
215
Download
0
Embed Size (px)
Citation preview
1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
Turn Trends into OpportunitiesVertical Wide
Michael Tjon-En-Fa Industry, Media & Local [email protected] 44 710 796
2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
AGENDA
The Cloud
Cut Cost on MPLS
Secure the Virtualized World
• Thinking of the Cloud• Network has Changed• Cloud Ready Network
• MPLS vs Internet•Service Provider Solutions for Enterprise
•The Physical Firewall is not Enough • Security = Portfolio of Solutions
3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
THE CLOUD
4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
THINKING OF THE CLOUD?
Decreasing Cost Cloud Increased Reliability More Offering
Or already Connected
5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
ROLE OF NETWORK HAS CHANGED
• Is your network cloud Ready!
• Continuity• Inefficient use of the Network• Poor Network Visibility• Inconsistent User Experience• Security (BYOD)
Legacy Three TierData Center
Up to 75% of trafficEW
6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
THE CLOUD READY NETWORK MEANS
1. Continuity – 99,999% (or 100%-10 min) - BOTH Cloud and Your Network Infrastructure
2. Efficient use of Network – 2 Tier
3. Manageability / Visibility – Visibility on application level to optimize network / compliancy
4. Consistent Performance / Experience anywhere on any device
7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
EXECUTE WITH JUNIPERCOMPLETE PORTFOLIO
Redundancy in FW (SRX)
Carrier Grade Hardware (SRX/EX/MX)
JUNOS – Proven Service Provider OS
Continuity
Virtual Chassis
Pay as you Grow
Extend VC over Distance
Throughput / €
Efficiency
SRX – App Secure
Central Management - Space
Secure Analytics
Application
WLAN - BYOD
Control UAC
Users
8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
CLOUD ENABLES YOU TO
Move LAN away from commodity
Discuss Multiple Solutions
Technological Advantages become important
Advise on the applications which are not CLOUD ready! – another opportunity
9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
CUT COST ON MPLS
10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
MPLS VS INTERNET
MPLS
• Uptime• Bandwidth Utilization• Managed with SLA’s• Simplification NW
INTERNET
• Improved SLA’s• High Bandwidth• Availability INTERNET
• Latency• Complexity
MPLS
• Expensive• Security• Partners not Flexible
11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
SIMILARITIES IN RFP’S / FEEDBACK
• MKB+
• Improved Security:• BYOD• NGF
• Take back Control: Central Management – Visibility
• Limited Solutions / Lack of Flexibility
12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
EXAMPLE
13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
SP SOLUTIONS FOR THE ENTERPRISE
1. Even if customer decides to keep MPLS – SRX can be placed in network
2. Create Overlay Network as Contracts Run Out
3. Juniper’s Core = Service Provider Solutions
4. Complete and Proven Portfolio
14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
EXECUTE WITH JUNIPERCOMPLETE PORTFOLIO
Best possible routing functionality on a firewall
Carrier Grade Hardware
JUNOS – Proven Service Provider OS
SRX
Central Granular Management
Control Applications
Simplified Roll Out
SPACE
Connect Any Device from Anywhere
Riverbed
MAG
15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
SECURE THE VIRTUALIZED WORLD
16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
MEGA TREND – SERVER VIRTUALIZATION
Source: IDC
CapitalSavings
1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 20130
20
40
60
80 Physical Server Installed Base (Millions)
MillionsInstalledServers
17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
FIREWALL / VIRTUAL - SECURITY
Firewall• Secure the Physical Network• IPS• NGF
VGW
• Secures the VM• Policy Enforcement on Migrating VM’s• Synchronizes with SRX
18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
WHAT ABOUT VIRTUAL MACHINES?
Physical Network Virtual Network
Physical Security Is “Blind” to Traffic between Virtual Machines
VM1 VM2 VM3
ES
X/E
SX
i Host
Firewall/IDS Sees/ProtectsAll Traffic between Servers
HYPERVISOR
Virtual Switch
19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
Purpose Built Virtual Security
VM1 VM2 VM3
VS
ES
X/E
SX
i Ho
st
Virtual Security Layer
Traditional Security Agents
VLANs & Physical Segmentation
VM1 VM2 VM3
VS
ES
X/E
SX
i Ho
st
VM1 VM2 VM3
VS
ES
X/E
SX
i Ho
st
Regular Thick Agent for FW & AV
HYPERVISORHYPERVISOR
HYPERVISOR
APPROACHES TO SECURING VIRTUAL NETWORKS
1 2 3
20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
FIREWALL PERFORMANCE
21 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
SECURE THE VM - EXAMPLES
Cloud Service Provider
Shipping Company
CARE
• Prevent Customer Data Migration within VM’s• Protect Customer Data• To Proof SLA’s
• Protect VDI Users at Best Possible Performance• Maintenance Tool VM’s• Audit Tool
• Audit Tool for Electronic Client Records• Protect Data• Control Data on VM Level
22 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
REAL LIFE
http://news.techworld.com/security/3474018/hackers-planted-remote-devices-to-smuggle-drugs-through-antwerp-port-europol-reveals/
23 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
SRX Series
Physical
HypervisorvGW Series
VM VM VM VM
vGW Virtual Gateway
Management and Security Services
Security Design
Security Threat Response ManagerSTRM
Services Virtual
Firewall
IPSDoS Prevention
AppSecure
DoS
JUNIPER SECURITY SOLUTION THAT SPANS PHYSICAL AND VIRTUAL NETWORKS
24 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
SUMMARY
1 Recurring Revenue
2 Drivers Seat
3 Portfolio
4 Services